Od 18 lat pomagamy firmom
w wyborze lepszego oprogramowania

Recenzje produktu: Beyond Identity

4,8 (12)

Informacje o produkcie: Beyond Identity

Bezpieczne, bezhasłowe, wieloskładnikowe uwierzytelnianie, które zapewnia wysoką pewność tożsamości cyfrowej danej osoby.

Dowiedz się więcej na temat produktu: Beyond Identity

Zalety:

Being the administrator of Beyond Identity internally I found it easy to deploy and get everyone enrolled with the authenticator.

Wady:

One particular feature where we could do OS level automated checks on the end user machines and block the access if they are found to be non compliant.

Oceny produktu: Beyond Identity

Średni wynik

Łatwość użytkowania
4,8
Obsługa klienta
4,9
Funkcje
4,3
Warte swojej ceny
4,9

Prawdopodobieństwo polecenia

9,2/ 10

Beyond Identity ma ogólną ocenę 4,8 na 5 w oparciu o recenzje użytkowników na Capterra w liczbie: 12.

Czy używałeś już produktu: Beyond Identity?

Dziel się swoimi doświadczeniami z innymi nabywcami oprogramowania.

Filtruj recenzje (12)

Shahrul
Shahrul
Information Technology Assistant w kraju: Malezja
Zweryfikowany użytkownik LinkedIn
Usługi finansowe, Pracownicy: 10 000+
Wykorzystano oprogramowanie w następującym celu: ponad 2 lata
Źródło recenzenta

Save and store password and identity

5,0 3 lata temu

Zalety:

I love it as it has making identity and password management really easy to manage and i have never had to restore my password again as all of my password information are safely stored in here.

Wady:

The are some bugs here and there, but nothing that are too much that are hindering me from completing my work in this software. No complaint from me for now.

Duke
Director of Corporate IT w kraju: Belgia
Usługi finansowe, Pracownicy: 201–500
Wykorzystano oprogramowanie w następującym celu: ponad 1 rok
Źródło recenzenta

Game Changing Authentication Solution

5,0 4 lata temu

Komentarze: We are one of the earlier, not earliest, adopters of Beyond Identity. BI team has been and still maintains to be very responsive to our issues and suggestions. The BI team was great during the PoC to the full roll-out process. I feel solutions like BI are a game-changer in alleviating typing of cryptic passwords to increase productivity. The one drawback of not requiring users to type their passwords on a daily basis is that users will forget their passwords periodically but this was an issue before BI as well. We need a Beyond User solution. With BI, it definitely felt like a partnership in evaluating, implementing, and using the product rather thana customer/vendor relationship.

Zalety:

- Password-less (not free) authentication add-on into our Single Sign-On OKTA. - Device information and trust

Wady:

- Management dashboard is still evolving so not yet mature to provide full analytics and reports. - Palo Alto Endpoint often flags updates as malware - Wish the client has an automatic update function

Zweryfikowany recenzent
Zweryfikowany użytkownik LinkedIn
Biotechnologia, Pracownicy: 501–1 000
Wykorzystano oprogramowanie w następującym celu: 1–5 miesięcy
Źródło recenzenta

Great customer support

4,0 4 lata temu

Zalety:

The product is super easy to use and makes it environment more secure while making users happy.

Wady:

We hit some snags with a few bugs, but the customer support we received from the engineering team really set them apart and they were able to resolve all of them within a reasonably fast time frame.

Nathaniel
Technical Presales Specialist w kraju: Wlk. Bryt.
Bezpieczeństwo komputerów i sieci, Pracownicy: 11–50
Wykorzystano oprogramowanie w następującym celu: 6–12 miesięcy
Źródło recenzenta

Review for Beyond Identity

5,0 4 lata temu

Zalety:

Being the administrator of Beyond Identity internally I found it easy to deploy and get everyone enrolled with the authenticator. This is perfect as I deployed it within minutes, all I had to do was assign a user into a group in our IAM solution and then Beyond Identity automatically send the users emails with steps on how to enrol with the authenticator app, the second they enrolled it then flicked the switch to allow users to authenticate passwordless instead of needing a username, password, and MFA method. Alongside this, Beyond Identity also has a managed environment, therefore I can create risk-based policies for how and when users can authenticate when using the authenticator application. From an end user’s perspective Beyond Identity makes my life a lot easier! I no longer need to use my mobile phone to authenticate me into my applications, this allows me to sign in rapidly instead of having to use a password and my mobile to gain access into my account.

Wady:

Updates everyday, this can be a tiny bit annoying but its understanding as the product is getting stronger.

Gaurav
Sr. Cloud Infra Engineer w kraju: USA
Oprogramowanie komputerowe, Pracownicy: 1 001–5 000
Wykorzystano oprogramowanie w następującym celu: ponad 1 rok
Źródło recenzenta

Easiest to deploy

4,0 3 lata temu

Komentarze: MFA to every app in our ecosystem

Zalety:

SaaS based. Quickest to depkoy. Easy to use. Love the feedback loop and insights from Beyond Identity team.

Wady:

One particular feature where we could do OS level automated checks on the end user machines and block the access if they are found to be non compliant.

Russell
Dir of Cybersecurity w kraju: USA
Sprzedaż detaliczna, Pracownicy: 501–1 000
Wykorzystano oprogramowanie w następującym celu: 1–5 miesięcy
Źródło recenzenta

core security

5,0 4 lata temu

Komentarze: very professional and responsive

Zalety:

effectiveness, ease of use, platform coverage

Wady:

there were no issues nothing nada it did what I want

Dan
eCommerce Manager / Senior Magento Developer w kraju: Wlk. Bryt.
Budownictwo, Pracownicy: 51–200
Wykorzystano oprogramowanie w następującym celu: 6–12 miesięcy
Źródło recenzenta

Great software, with great customer service

5,0 3 lata temu

Komentarze: It has massively helped with user/device authentication and resolves the issue of users sharing passwords.

Zalety:

Easy to get set up, easy to manage, easy to use!

Wady:

I can't think of anything, all issues we did have with either setup or compatibility with our internal network have been resolved

Srini
Manager w kraju: USA
Oprogramowanie komputerowe, Pracownicy: 5 001–10 000
Wykorzystano oprogramowanie w następującym celu: 1–5 miesięcy
Źródło recenzenta

Seamless PasswordLess expereince

5,0 3 lata temu

Komentarze: Seamless passwordless experience.

Zalety:

Entire passwordless solution is built on the PKI concepts and every individual device is root on it's own and easy to manager. No additional certificate management overhead. Reduced helpdesk cost with 100% self service

Wady:

Solution not ready yet for end to end passwordless such as SSH and sudo access to linux servers etc.

Steve
Technical Manager w kraju: Wlk. Bryt.
Technologia i usługi informacyjne, Pracownicy: 11–50
Wykorzystano oprogramowanie w następującym celu: 1–5 miesięcy
Źródło recenzenta

Increased security without increasing user friction

5,0 4 lata temu

Komentarze: Increasing security which is incredibly user when responsible for cyber security. The ability to remove the dependency on passwords which cause many breaches.
I now used Beyond Identity on my laptop and on my mobile device.

Zalety:

Effective without making life more difficult

Wady:

If the app is not open it causes issues. Doesn't just open the app smoothly.

Harry
Channel Account Manager w kraju: Wlk. Bryt.
Technologia i usługi informacyjne, Pracownicy: 11–50
Wykorzystano oprogramowanie w następującym celu: 1–5 miesięcy
Źródło recenzenta

great system

5,0 4 lata temu

Komentarze: great system, that I am glad my employer uses.

Zalety:

Coming from a company that had several MFA, for me its the time saving element of just being able to log in straight away, not having to go find my mobile, type a code in wait for the code to arrive via text. one click and im into all my systems, great. plus no longer having to worry about getting help desk involved with a password reset.

Wady:

I dont have any cons yet as a new user. I wasn't involved in set up

matthew
account exc w kraju: Wlk. Bryt.
Bezpieczeństwo komputerów i sieci, Pracownicy: 11–50
Wykorzystano oprogramowanie w następującym celu: 1–5 miesięcy
Źródło recenzenta

Beyond identity review

5,0 4 lata temu

Zalety:

It's the simplicity for me. I log in with my username in the morning and thats it. No worries of forgetting to turn on capitals or mispelling my password. And with the intergration with Okta its made my day so much quicker.

Wady:

The frequent udates are annoying. Although they normally take less than five minutes, it is annoying when i have to keep updating it.

Joshua
Account executive w kraju: Wlk. Bryt.
Bezpieczeństwo i dochodzenia, Pracownicy: 11–50
Wykorzystano oprogramowanie w następującym celu: 1–5 miesięcy
Źródło recenzenta

Ease and security

5,0 4 lata temu

Komentarze: Really good, like where the product is going and the ease of use, hope it can keep on improving though it's cycles

Zalety:

How easy it makes it to actually log on and having my time saved and not having to remember passwords.

Wady:

Updates everyday and can sometimes be slightly slow, though I know this is improving